Data-Driven Optimization Based Primary Users’ Operational Privacy Preservation

Jingyi Wang,S. Errapotu,Yanmin Gong,Lijun Qian,R. Jäntti,M. Pan,Zhu Han
DOI: https://doi.org/10.1109/TCCN.2018.2837876
IF: 6.359
2018-06-01
IEEE Transactions on Cognitive Communications and Networking
Abstract:Recently opened spectrum within 3550–3700 MHz provides more accessing opportunities to secondary users (SUs), while it also raises concerns on the operational privacy of primary users (PUs), especially for military and government. In this paper, we propose to study the tradeoff between PUs’ temporal privacy and SUs’ network performance using the data-driven approach. To preserve PUs’ temporal operational privacy, we develop an obfuscation strategy for PUs, which allows PUs to intentionally add dummy signals to change the distribution of temporal spectrum availability, and confuse the adversary. While generating the dummy signals for privacy, the PUs have to consider the utility of SUs and try their best to satisfy SUs’ uncertain traffic demands. Based on the historical data, we employ a data-driven risk-averse model to characterize the uncertainty of SUs’ demands. With joint consideration of frequency reuse in the cognitive radio network, PUs’ privacy, and uncertain SUs’ demands, we employ a conflict graph to characterize the interference relationship between SUs, and formulate the data-driven risk-averse stochastic optimization problem. We provide corresponding solutions and through numerical simulation, we show that the proposed scheme is effective in preserving PUs’ temporal operational privacy while offering good enough spectrum resources to satisfy SUs’ traffic demands.
Computer Science
What problem does this paper attempt to address?